My Orbot App Stopped is Bootleg even though it was 100%. After it shit down it said " Definitely Not The Fbi" What Does this mean? Im assuming a warning. I Shut the process down. Cleared data and cut ...

I am very new to using proxy chains, and since I was worried about messing up while setting up a proper proxy chain I have been using tor browser. Is using tor browser same as using proxy chain using ...

I have some question about the very basics of tor, as this keeps bugging me now for some time:
As far as I know every tor node is only aware of the ip address of the following node. For example the ...

Is it possible, and if so how, to set tor so that my entry and/or exit IP will be from a specific state in the US ? Idk like NY, FL, TX, CA...
I already know how to choose a specific country, but i'd ...

Say I'm using Tor, and I make an error by, for example, logging into an account on a website. Will this deanonymization only affect my current session, since I can just restart my browser and get a ...

I am curious how I can rely on Tor network in terms of traceability.
I am looking for really professional who can say if my Tor communication is secure, if a Tor exit node is detectable or traceable....

Hi I am trying to make a code that monitors cryptocurrency prices, so I am fetching JSON data from public sources and then processing it. I am using this python code by @Anurag Uniyal:
import urllib....

I know it's dangerous to allow javascript on some website. But very often if you want to register on a website you need to type captcha. If you want to see captcha you need to allow javascript from ...

I'm writing a novel, and one of my characters is into some illegal activities on the web. He's ultra-paranoid about security, so uses Tor...but he doesn't want anyone who might snoop in his computer ...

I have been recently doing some research on anonymity implications of using a bridge, and wrote a tool (not very well written though) for setting up a malicious bridge node. However, I am not clear ...

I know that TOR protects me against de-anonymization by the websites / services I use. However If an attacker knows my physical location can I use TOR to hide the fact that I visit certain websites / ...

When trying to log-in to my Telegram account on web.telegram.org I get requested to insert my phone number as usual. The next step would be insertion of a log-in authentification code that I receive ...

When I try to open up an onion site, it says forbidden. I've looked at some sites for this question and it says you have to change your time zone. But what timezone? There's so many to choose from lol....

Recently I downloaded some e-books from b-ok.org (formerly known as bookzz). After downloading a few books, the site notified me that: "more than 5 books have been downloaded from this IP in the last ...

I like not having to "Right Click File -> Save As..." images and files and instead usually drag them from the browser page to my desktop. Does this mean I am circumventing Tor security / anonymity or ...

If I run a VPS (using Orange VPS provider out of Iceland, purchased with monero-filtered bitcoin) as a TOR exit node, and that VPS (running Streisand) is also the VPS I use for a privately controlled ...

So basically what I'm asking is: will downloading files (ie., video files, DOC files ect) compromise my anonomity? I ask because I visited some forums selling a answer to this very question and some ...

I have configured a router to route all traffic from an internal interface through the TOR network. Therefore, every client that uses this router as its Gateway will access the internet through TOR, ...

With so much hype about the 'darknet' and 'tor', i still don't see how it can be completely anonymous if it is implemented in the application layer?
If a webserver, using Nginx or something similar, ...